Have a personal or library account? Click to login
Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform Cover

Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform

Open Access
|Mar 2020

References

  1. 1. Daemen, J., V. Rijmen. The Design of Rijndael: AES – the Advanced Encryption Standard. Springer Science & Business Media, 2013.
  2. 2. Rivest, R. L. The RC5 Encryption Algorithm. – In: Proc. of 2nd International Workshop, Fast Software Encryption, Springer-Verlag, 1995, pp. 86-96.10.1007/3-540-60590-8_7
  3. 3. Rivest, R., M. Robshaw, R. Sidney, Y. L. Yin. The RC6 Block Cipher. – In: NIST AES Proposal, 1998.
  4. 4. Fridrich, J. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. – Int. J. Bifurc. Chaos, Vol. 8, 1998, pp. 1259-1284.10.1142/S021812749800098X
  5. 5. Wang, X., L. Teng. An Image Blocks Encryption Algorithm Based on Spatiotemporal Chaos. – Nonlinear Dyn., Vol. 67, 2011, pp. 365-371.10.1007/s11071-011-9984-7
  6. 6. Ye, G. D., K. W. Wong. An Efficient Chaotic Image Encryption Algorithm Based on a Generalized Arnold Map. – Nonlinear Dyn., Vol. 69, 2012, pp. 2079-2087.10.1007/s11071-012-0409-z
  7. 7. Tong, Z. Novel Bilateral-Diffusion Image Encryption Algorithm with Compound Chaos and LFSR. – J. Imaging Sci., Vol. 60, 2012, pp. 294-304.10.1179/1743131X11Y.0000000042
  8. 8. Wang, X., D. Luan. A Novel Image Encryption Algorithm Using Chaos and Reversible Cellular Automata. – Commun. Nonlinear Sci. Numer. Simul., Vol. 18, 2013, pp. 3075-3085.10.1016/j.cnsns.2013.04.008
  9. 9. Shannon, C. Communication Theory of Secrecy Systems. – Bell System Technical Journal, Vol. 28, 1949, pp. 656-715.10.1002/j.1538-7305.1949.tb00928.x
  10. 10. Tong, X. Design of an Image Encryption Scheme Based on a Multiple Chaotic Map. – Commun. Nonlinear Sci. Numer. Simul., Vol. 18, 2013, pp. 1725-1733.10.1016/j.cnsns.2012.11.002
  11. 11. Tong, X., Z. Wang, M. Zhang. A New Algorithm of the Com-Bination of Image Compression and Encryption Technology Based on Cross Chaotic Map. – Nonlinear Dyn., Vol. 72, 2013, pp. 229-241.10.1007/s11071-012-0707-5
  12. 12. Wang, X., K. Guo. A New Image Alternate Encryption Algorithm Based on Chaotic Map. – Nonlinear Dyn., Vol. 76, 2014, pp. 1943-1950.10.1007/s11071-014-1259-7
  13. 13. Ye, R., W. Guo. A Chaos-Based Image Encryption Scheme Using Multimodal Skew Tent Maps. – J. Emerg. Trends Comput. Inf. Sci., Vol. 4, 2013, No 10.10.5815/ijcnis.2012.01.05
  14. 14. Ye, R., W. Zhou. A Chaos-Based Image Encryption Scheme Using 3D Skew Tent Map and Coupled Map Lattice. – Int. J. Comput. Netw. Inf. Secur., Vol. 4, 2012, No 1, pp. 25-28.10.5815/ijcnis.2012.01.05
  15. 15. Kanso, A. Self-Shrinking Chaotic Stream Ciphers. – Commun. Nonlinear Sci. Numer. Simul., Vol. 16, 2011, No 2, pp. 822-836.10.1016/j.cnsns.2010.04.039
  16. 16. Akhavan, A., A. Samsudin, A. Akhshani. A Symmetric Image Encryption Scheme Based on Combination of Nonlinear Chaotic Maps. – J. Frankl. Inst., Vol. 348, 2011, No 8, pp. 1797-1813.10.1016/j.jfranklin.2011.05.001
  17. 17. Jakimoski, G., L. Kocarev et al. Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps. – IEEE Trans. Circuits Syst. I Fundam. Theory Appl., Vol. 48, 2001, No 2, pp. 163-169.10.1109/81.904880
  18. 18. Li, C., G. Luo, K. Qin, C. Li. An Image Encryption Scheme Based on Chaotic Tent Map. – Nonlinear Dyn., Vol. 87, 2017, No 1, pp. 127-133.10.1007/s11071-016-3030-8
  19. 19. Pareek, N. K., V. Patidar, K. K. Sud. Image Encryption Using Chaotic Logistic Map. – Image and Vision Computing, Vol. 24, 2006, No 9, pp. 926-934.10.1016/j.imavis.2006.02.021
  20. 20. Mondal, B., P. Kumar, S. Singh. A Chaotic Permutation and Diffusion-Based Image Encryption Algorithm for Secure Communications. – Multimedia Tools and Applications, 2018. DOI:10.1007/s11042-018-6214-z.10.1007/s11042-018-6214-z
  21. 21. Luo, Y., J. Yu, W. Lai, L. Liu. A Novel Chaotic Image Encryption Algorithm Based on Improved Baker Map and Logistic Map. – Multimedia Tools and Applications, 2019. DOI:10.1007/s11042-019-7453-3.10.1007/s11042-019-7453-3
  22. 22. Cheng, L. Z. On Computing the Two-Dimensional (2-D) Type IV Discrete Cosine Transform (2-D DCT-IV). – IEEE Signal Processing Letters, Vol. 8, 2011, pp. 239-241.10.1109/97.935741
  23. 23. Prasad, B., K. Mishra. A Combined Encryption Compression Scheme Using Chaotic Maps. – Cybernetics and Information Technologies, Vol. 13, 2013, No 2, pp. 75-81.10.2478/cait-2013-0016
  24. 24. Verma, M., R. Ranim. Significant Secret Image Sharing Scheme Based on Boolean Operation. – Cybernetics and Information Technologies, Vol. 17, 2017, No 2, pp. 134-150.10.1515/cait-2017-0022
  25. 25. Brindha, K., N. Jeyanthi. Secret Image Enhanced Sharing Using Visual Cryptography. – Cybernetics and Information Technologies, Vol. 17, 2017, No 3, pp. 128-139.10.1515/cait-2017-0034
  26. 26. Borissov, Y., P. Boyvalenkov, R. Tsenkov. On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-Boxes. – Cybernetics and Information Technologies, Vol. 16, 2016, No 4, pp. 3-12.10.1515/cait-2016-0063
  27. 27. Brindha, K., N. Jeyanthi. Secured Document Sharing Using Visual Cryptography in Cloud Data Storage. – Cybernetics and Information Technologies, Vol. 15, 2015, No 4, pp. 111-123.10.1515/cait-2015-0058
  28. 28. Yang, Z., M. Jia, W. Wang, J. Zhang. Multi-Stage Encoding Scheme for Multiple Audio Objects Using Compressed Sensing. – Cybernetics and Information Technologies, Vol. 15, 2015, No 6, pp. 135-146.10.1515/cait-2015-0074
  29. 29. Sastry, V. U. K., N. R. Shankar, S. D. Bhavani. A Large Block Cipher Involving Key Dependent Permutation, Interlacing and Iteration. – Cybernetics and Information Technologies, Vol. 13, 2013, No 3, pp. 50-63.10.2478/cait-2013-0025
  30. 30. Priya, R., R. Vidhyapriya, K. Seifedine, D. Robertas, B. Tomas. An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic-Tent Map. – Entropy, Vol. 21, 2019, 656, pp. 1-17.10.3390/e21070656751515233267370
  31. 31. Sallam, A. I., M. El-Sayed, El-Rabaie, O. S. Faragallah. CABAC-Based Selective Encryption for HEVC Using RC6 in Different Operation Modes. – Multimedia Tools and Applications, Vol. 77, 2018, No 21, pp. 28395-28416.10.1007/s11042-018-5994-5
  32. 32. Faragallah, O. S. Optical Double Color Image Encryption Scheme in the Fresnel-Based Hartley Domain Using Arnold Transform and Chaotic Logistic Adjusted Sine Phase Masks. – Optical and Quantum Electronics, Vol. 50, 2018, No 3:118, pp. 1-27.10.1007/s11082-018-1363-x
  33. 33. Sallam, A. I., M. El-Sayed, El-Rabaie, O. S. Faragallah. HEVC Selective Encryption Using RC6 Block Cipher Technique. – IEEE Transactions on Multimedia, Vol. 20, 2018, No 7, pp. 1636-1644.10.1109/TMM.2017.2777470
  34. 34. Faragallah, O. S., M. A. Alzain, H. S. El-Sayed, J. F. Al-Amri, W. El-Shafai, A. Afifi, E. A. Naeem, B. Soh. Block-Based Optical Color Image Encryption Based on Double Random Phase Encoding. – IEEE Access, Vol. 7, 2018, pp. 4184-4194.10.1109/ACCESS.2018.2879857
  35. 35. Hemdan, A. M., O. S. Faragallah, O. Elshakankiry, A. Elmhalaway. A Fast Hybrid Image Cryptosystem Based on Random Generator and Modified Logistic Map. – Multimedia Tools and Applications, Vol. 78, 2019, No 12, pp. 16177-16193.10.1007/s11042-018-6948-7
DOI: https://doi.org/10.2478/cait-2020-0005 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 68 - 81
Submitted on: Nov 28, 2019
Accepted on: Jan 6, 2020
Published on: Mar 27, 2020
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2020 Hesham Alhumyani, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.